[CLSA-2026:1768775579] kernel: Fix of 49 CVEs
Type:
security
Severity:
Important
Release date:
2026-01-19 15:09:29 UTC
Description:
- scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process() {CVE-2023-53803} - md/raid1: Fix stack memory use after return in raid1_reshape {CVE-2025-38445} - ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() {CVE-2025-38249} - atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459} - dm cache: free background tracker's queued work in {CVE-2023-53765} - drm/vmwgfx: Validate the box size for the snooped cursor {CVE-2022-36280,CVE-2022-50440} - vsock: Do not allow binding to VMADDR_PORT_ANY {CVE-2025-38618} - ice: set tx_tstamps when creating new Tx rings via ethtool {CVE-2022-50710} - sctp: avoid NULL dereference when chunk data buffer is {CVE-2025-40240} - ip6_vti: fix slab-use-after-free in decode_session6 {CVE-2023-53821} - wifi: mac80211_hwsim: drop short frames {CVE-2023-53321} - ext4: add bounds checking in get_max_inline_xattr_value_size() {CVE-2023-53285} - md/raid10: fix null-ptr-deref in raid10_sync_request {CVE-2023-53832} - dm flakey: fix a crash with invalid table line {CVE-2023-53786} - wifi: mt7601u: fix an integer underflow {CVE-2023-53679} - ext4: fix bug_on in __es_tree_search caused by bad boot loader inode {CVE-2022-50638} - ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode - ext4: add helper to check quota inums - ext4: fix bug_on in __es_tree_search caused by bad quota inode - quota: Factor out setup of quota inode - USB: usbtmc: Fix direction for 0-length ioctl control messages {CVE-2023-53761} - ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer {CVE-2023-53395} - drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] {CVE-2024-46815} - Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition {CVE-2023-1989} - nvmet: avoid potential UAF in nvmet_req_complete() {CVE-2023-53116} - wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258} - dm raid: fix address sanitizer warning in raid_status {CVE-2022-50084} - vt: Clear selection before changing the font {CVE-2022-49948} - ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917} - capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870} - ata: libata-transport: fix double ata_host_put() in ata_tport_add() {CVE-2022-49826} - ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix {CVE-2022-49503} - selinux: Add boundary check in put_entry() {CVE-2022-50200} - rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails {CVE-2023-53307} - RDMA/mlx5: Return the firmware result upon destroying QP/RQ {CVE-2023-53286} - sched/fair: Don't balance task to its current running CPU {CVE-2023-53215} - powercap: intel_rapl: fix UBSAN shift-out-of-bounds issue {CVE-2022-50366} - ACPI: tables: FPDT: Don't call acpi_os_map_memory() on invalid phys address {CVE-2022-50320} - wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect() {CVE-2022-50881} - slcan: Don't transmit uninitialized stack data in padding {CVE-2020-11494} - media: dvb-frontends: avoid stack overflow warnings with clang {CVE-2024-27075} - PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free {CVE-2023-53446} - cifs: Fix warning and UAF when destroy the MR list {CVE-2023-53427} - sctp: fix a potential overflow in sctp_ifwdtsn_skip {CVE-2023-53372} - md/raid10: check slab-out-of-bounds in md_bitmap_get_counter {CVE-2023-53357} - lwt: Fix return values of BPF xmit ops {CVE-2023-53338} - ubi: ensure that VID header offset + VID header size <= alloc, size {CVE-2023-53265} - ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage() {CVE-2022-50423} - Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times {CVE-2022-50419} - ACPICA: Fix error code path in acpi_ds_call_control_method() {CVE-2022-50411} - ata: ahci: Match EM_MAX_SLOTS with SATA_PMP_MAX_PORTS {CVE-2022-50315} - wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace {CVE-2023-54286}
Updated packages:
  • bpftool-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:15d658713efc23c88037a8d4395ba0a425af7a3172b42d8eb8d425bec7cc8c11
  • kernel-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:c0ea860ec59fddd7c53a5ea86125efe5161666aa1e2e7524b7dd5c124d119570
  • kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:d4f21de2c569e64b2293f45cabeafe52da153896fb0e78653591e7a57f6b6d2f
  • kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:d697ab4f729745836ac97d6cae8bda6df5d61988e37ddab1908408cd104747d9
  • kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:9bc9cc0e5b4a1c6f7c723e6bafc6d365fd8a9f0389089803bd636b7dba6e49f6
  • kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:77c6155d1ffea52810be069f09eba439eb895585764232c834042e829601adec
  • kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:86e544b75e16ec5091528a4c7a5b599e13560626a5470656e0bfe4ca9f78e247
  • kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:d2b2a4c656ced8b4c84a12b7f24c2edac03bdc0681f8afe3423e30d4d8f4ca6d
  • kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:35106c5819e92570c30848315ab99718dcfdd1ebcdbf1bbc5d55ec3a86d908f3
  • kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:616202862aef8e46e0bc0e1697d964330242e23e5b3981271e30d6f86b4af208
  • kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:950d0bbc6b2d6b92ea58ed4f55f09b2da592d83c6a243d4b74191329d9913622
  • kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:174397889993e69c53502f956ab52f1f4a33b08ab14cbbe583160d72aae363db
  • kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:c6f9f79353bda094171fdb3470b68a8bbb9f91e043fedac545c5ba10950f1842
  • kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:9906610015569466c7e05aedb90ad076f6f59465c1bd063a2b73a5e8bce66f39
  • kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:528f4844ba7ee90bb019de7f8af075933fea7ed0d2f16aa4de92c4160a83362e
  • kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:ce9b19598a581653316752ebbacf376d735531fa34b212591646b3cb3d74fc0f
  • kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:5395525aed59570f8291658821272d663f5f0793b1d03111880d397bd9b5ca5c
  • kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:2f9d899dcef8665d3e2167471237d4ebb3c1feee76e428c72da62437f276ae4c
  • kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:05cc1da567b80a8e9647de36a4bdaf39e41cb4b9b889d069e8c2cc534dec80a3
  • kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:1c73eb012cc0a4b93b6bf0f5900e57181d9c577ecadcfe5739e1ecbad38707ee
  • perf-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:5ffd19fa3c87dc987e967b0678f76fb19c40bd2014d8e9ac0f55303fb0ddb144
  • python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els33.x86_64.rpm
    sha:af30c1be815c0a5216fe2dffcb2904879038d551f725b10f58788a86a52337ba
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.